D Feng, Y Qin, W Feng, W Li, K Shang… - IET …, 2024 - Wiley Online Library
As the global data strategy deepens and data elements accelerate integrating and flowing more rapidly, the demand for data security and privacy protection has become increasingly …
Confidential computing is an emerging technique that provides users and third-party developers with an isolated and transparent execution environment. To support this …
Failure diagnosis in practical systems is difficult, and the main obstacle is that the information a developer has access to is limited. This information is usually not enough to …
T Yue, F Zhang, Z Ning, P Wang, X Zhou… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Many modern processors have embedded hardware tracing techniques (eg, Intel Processor Trace or ARM CoreSight). While these techniques are widely used due to their transparency …
Machine-learning (ML) models are increasingly being deployed on edge devices to provide a variety of services. However, their deployment is accompanied by challenges in model …
Z Wang, J Zhan, X Ding, F Zhang, N Hu - Proceedings of the 19th ACM …, 2024 - dl.acm.org
Process synchronization primitives lubricate server computing involving a group of processes as they ensure those processes to properly coordinate their executions for a …
T Sun, B Li, Y Teng, Y Gao… - 2024 23rd ACM/IEEE …, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) applications have recently been widely used in safety-critical scenarios. To prevent sensitive information leaks, IoT device vendors provide hardware …
Trusted execution environments in several existing and upcoming CPUs demonstrate the success of confidential computing, with the caveat that tenants cannot securely use …